May 10, 2018 asvignesh

With vSphere 6.7 web services SOAP API  includes the creation date of a Virtual Machine and will be persisted with the life-cycle of the VM itself. You can get it from Virtual Machine -> Config -> createDate. Earlier to 6.7, we can track the VM Creation Time using EventManager. We should create an EventFilterSpec to filter the events by Virtual Machine creation or deployed, Registered or Cloned Events. new String[]{“VmCreatedEvent”, “VmBeingDeployedEvent”, “VmRegisteredEvent”, “VmClonedEvent”} Get Virtual Machine Creation Time earlier to vSphere 6.7 Java https://gist.github.com/asvignesh/fd97f4cbc41ac55e5b289c3424c0f09a vSphere Power CLI https://gist.github.com/asvignesh/327169f8456bbd613eebfad3d9768fa8

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

May 5, 2018 asvignesh

I recently had a demand to deploy an OVF (Open Virtualization Format is an open-source standard for packaging and distributing software applications for virtual machines) which is located on Datastore of ESXi Server. When you try to deploy from vSphere web client ( Flash / HTML) you can specify the OVF URL or the location accessible from my computer. Specifying the path from the local computer is simple if browser detects the VMware Client Integration tool. But you cant see the option to deploy from Datastore. How to Deploy an OVF from ESXi Datastore In vSphere, you have an option to…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

January 22, 2018 asvignesh 1Comment

Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. Ransomware is different from other attacks that it’s all about storage. The hacker’s application locks up your storage by encrypting it and more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them and you either unravel the rogue code’s encryption or start learning about blockchain technology and shipping bitcoins into the ether. Recently, An Indiana hospital…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

January 15, 2018 asvignesh

Today’s developers and organizations are migrating large, monolithic legacy applications to microservice-based architectures to improve scalability and developer velocity. However, these benefits come at a cost, namely integration complexity. Additionally, developers still often interact directly with the infrastructure, whether it be virtual machines (VMs) or containers via Kubernetes or another container orchestrator. Serverless is the next evolution of application and system design and deployment. Serverless applications are built upon functions—small code artifacts, which are compact and specific to a discrete task. Serverless doesnt means servers are no more required to run workloads, it simply means that developers no longer has…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

January 9, 2018 asvignesh

Amazon AWS Lambda functions are becoming more popular. Where I don’t need to setup and manage servers to Dev and deploy my code. Currently Lambda supports node Java python and C#. In the AWS reInvent AWS .Net team showed the demo of upcoming feature runtime executing a full ASP.NET core application with ASP.NET Razor pages. They showed the demo with AWS XRay . They have preannounced the support for .NET core 2.0 in AWS Lambda. Watch Deploying application on AWS with .NET core https://www.youtube.com/watch?v=IfF1E2RJ6Do

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

October 31, 2017 asvignesh

[amazon_link asins=’8126565780,B007X6SMD6,B01FGT7J3K,B007Q4XQEU,B01LX8J2S9,B01MG5IPDO,B01FSZHYSW’ template=’ProductCarousel’ store=’asvignesh-21′ marketplace=’IN’ link_id=’c40293c0-c0bb-11e7-9231-5decb318ea19′]   First stop the AWS EC2 Instance Create the EBS snapshot of the volume which you want to encrypt Copy the EBS snapshot which you created in the previous step to same availability zone and check the Encryption check box Create the new EBS volume from the encrypted EBS snapshot Now the newly created EBS volume is Encrypted Detach the root volume and attach the new Encrypted volume with the same device name ( /dev/sda1 )

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

August 8, 2015 asvignesh

I’ve been developing an automation scripts to provision and expand VMFS Datastore. Expand not Extent… I increased the storage volume size and need to increase the size of VMFS datastore without affording the downtime Here is the VIjava / YAVI Java code for expanding the datastore   https://gist.github.com/cd02090562b8cf2ee0e3   [amazon_link asins=’B002SSBD8A’ template=’ProductLink’ store=’asvignesh-21′ marketplace=’IN’ link_id=’2f839008-c0c9-11e7-a460-f1aec9ea1733′]

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

May 22, 2015 asvignesh 1Comment

VSS hardware provider can be initiate and test using DiskShadow Commands Open the Powershell and Enter Diskshadow PS C:\Users\Administrator> diskshadow Microsoft DiskShadow version 1.0 Copyright (C) 2013 Microsoft Corporation On computer: WIN-VigneshDev, 5/22/2015 12:06:35 AM DISKSHADOW> List the Hardware Providers DISKSHADOW> list providers * ProviderID: {74600e39-7dc5-4567-a03b-f091d6c7b092} Type: [2] VSS_PROV_SOFTWARE Name: Hyper-V IC Software Shadow Copy Provider Version: 1.0.0.0 CLSID: {3e02620c-e180-44f3-b154-2473646e4cb8} * ProviderID: {89300202-3cec-4981-9171-19f59559e0f2} Type: [4] VSS_PROV_FILESHARE Name: Microsoft File Share Shadow Copy provider Version: 1.0.0.1 CLSID: {fce59da7-7bac-40da-8d21-3e7311ba51cd} * ProviderID: {b57190af-4567-4dd0-ad8d51abd60b20d5 Type: [3] VSS_PROV_HARDWARE Name: Vignesh Test Provider Version: 6.2.9200.16384 * ProviderID: {b5946137-7b9f-4925-af80-51abd60b20d5} Type: [1] VSS_PROV_SYSTEM Name: Microsoft Software Shadow Copy…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

January 6, 2015 asvignesh

Inconsistent Backup The oldest type of backup probably not consistent. The process of taking the backup was so simple, backup application starts at the beginning of a file structure and copies all of the data until it reaches the end, resulting in a backup (Inconsistent). The reason which can make this backup inconsistent is that if any user added/modified after a backup but before it completed that would result in an inconsistent backup; the files in the backup are not consistent. Mainly the volumes which have Random read and random writes application like databases these types of backups do not…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.